01-27-2013, 03:26 AM
Congratulations, your IQ is -1, sir.
How do I crack substr hash?
|
01-27-2013, 03:26 AM
Congratulations, your IQ is -1, sir.
here's my stab at creating a program to crack this type of hash. not exceptionally good since it doesn't use sse2 or anything, but it is multithreaded and should be quite a bit faster than the other two that atom and undeath provided. seems to reliably find a collision in under a minute on my box.
http://bindshell.nl/pub/md5substr_mt.c Code: epixoip@db:~$ ./md5substr cafebabe
01-30-2013, 01:42 AM
Stop abusing these poor little md5s! :'(
01-30-2013, 02:38 AM
no way, this is way too much fun! what i want now is for someone to one-up me and post an even faster version.
01-30-2013, 11:55 AM
Oh yeah, thats the spirit!!
02-04-2013, 09:50 AM
Worked on this a little bit more and came up with another version that is ~ 45% faster, still without using SIMD.
http://bindshell.nl/pub/md5substr_mt2.c Code: epixoip@db:~$ ./md5substr2 aaaaaaaa
All right gents, here's a SIMD-accelerated version that uses SSE2 and, if applicable, XOP. It's ~ 350% faster than the code posted above.
http://bindshell.nl/pub/md5substr_simd.c I used an unconventional interleaving technique (interleaving each step, rather than each operation) which ended up being a bit faster than current implementations. On an FX-4100 the XOP code is ~240% faster than hashcat 0.42, and ~1.2% faster than John the Ripper. On a Xeon X7350, the SSE2 code is ~260% faster than hashcat 0.42, and ~1.1% faster than John the Ripper. Code: epixoip@db:~$ ./md5substr aaaaaaaa
02-15-2013, 04:20 PM
Wow, I never knew you were little md5s fetish.
:P Btw, impressive work though I don't see the need to all this speed in such job. Unless you're really... ahem.. a little md5s fetish.
02-16-2013, 02:47 AM
well, the md5 implementation itself is not specific to cracking substr() hashes. the only part of this program that is specific to cracking the substr() hashes is the hash comparison. so the bulk of this code can be reused just about anywhere that md5 is used.
12-06-2015, 02:59 PM
I am attempting to crack a substr(md5($pass),12,20) and came across this thread after a google search as Hashcat does not support it.
I have ran the script by atom with the windows command oclHashcat-1.37\maskprocessor-0.73>mp64.exe ?d?d?d?d?d?d?d?d?d?d | subhash.c substring.txt deadbeef and although it found nothing it appeared to work (run without errors) my questions as I am unfamiliar with this hash is 1. Do I have to change anything in the script as this was originally written for the original post of substr(md5(password), 0, 8)` 2. What exactly is the mask ?d?d etc. doing - is it passing digits to the hash text file or is it apply places/lengths to the possible pass. 3. What is the purpose of the aaaaaaaa and deadbeef at the end of the command line 4. Tried to run Undeaths script but got the error stdin = sys.stdin.detach() ttributeError: 'file' object has no attribute 'detach' 5. The link to epixoip's script is dead so was unable to try that - if someone could upload it again I will be grateful. |
« Next Oldest | Next Newest »
|